default search action
Jana Fruth
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [j6]Jana Fruth, Olivier Roustant, Sonja Kuhnt:
Support indices: Measuring the effect of input variables over their supports. Reliab. Eng. Syst. Saf. 187: 17-27 (2019) - 2018
- [b1]Jana Fruth:
An effective security warning approach for malware attacks on mobile devices. Otto-von-Guericke University Magdeburg, Germany, 2018 - 2017
- [j5]Thomas Mühlenstädt, Jana Fruth, Olivier Roustant:
Computer experiments with functional inputs and scalar outputs by a norm-based approach. Stat. Comput. 27(4): 1083-1097 (2017) - 2015
- [j4]Jana Fruth, Olivier Roustant, Sonja Kuhnt:
Sequential designs for sensitivity analysis of functional inputs in computer experiments. Reliab. Eng. Syst. Saf. 134: 260-267 (2015) - [j3]Roland Fried, Inoncent Agueusop, Björn Bornkamp, Konstantinos Fokianos, Jana Fruth, Katja Ickstadt:
Retrospective Bayesian outlier detection in INGARCH series. Stat. Comput. 25(2): 365-374 (2015) - 2014
- [j2]Olivier Roustant, Jana Fruth, Bertrand Iooss, Sonja Kuhnt:
Crossed-derivative based sensitivity measures for interaction screening. Math. Comput. Simul. 105: 105-118 (2014) - [c13]Jana Fruth, Matthias Thimm, Sven Kuhlmann, Jana Dittmann:
Ein erster Prototyp: Sicherheitsguide für Grundschulkinder beim Umgang mit dem Internet. GI-Jahrestagung 2014: 2081-2092 - [c12]Jana Fruth, Edgar Nett:
Uniform Approach of Risk Communication in Distributed IT Environments Combining Safety and Security Aspects. SAFECOMP Workshops 2014: 289-300 - 2013
- [c11]Jana Fruth, Carsten Schulze, Marleen Rohde, Jana Dittmann:
E-Learning of IT Security Threats: A Game Prototype for Children. Communications and Multimedia Security 2013: 162-172 - [c10]Jana Fruth, Marcel Beskau, Matthias Volk, Anneke Meyer, Robin Richter, Jana Dittmann:
Erster Konzeptansatz von Sicherheitstypen: Sicherheitsbewusstsein von Kindern und Jugendlichen im Umgang mit dem Internet. GI-Jahrestagung 2013: 2000-2014 - 2012
- [c9]Fred Samland, Jana Fruth, Mario Hildebrandt, Tobias Hoppe, Jana Dittmann:
AR.Drone: security threat analysis and exemplary attack to track persons. Intelligent Robots and Computer Vision: Algorithms and Techniques 2012: 83010G - [c8]Wiebke Menzel, Sven Tuchscheerer, Jana Fruth, Christian Kraetzer, Jana Dittmann:
Design and evaluation of security multimedia warnings for children's smartphones. Multimedia on Mobile Devices / Multimedia Content Access: Algorithms and Systems 2012: 83040B - [c7]Sven Kuhlmann, Jana Fruth, Tobias Hoppe, Jana Dittmann:
Simulation of Structural Effects in Embedded Systems and Visualization of Dependencies According to an Intended Attack or Manipulation. SAFECOMP Workshops 2012: 498-507 - [c6]Janet Siegmund, Norbert Siegmund, Jana Fruth, Sven Kuhlmann, Jana Dittmann, Gunter Saake:
Program Comprehension in Preprocessor-Based Software. SAFECOMP Workshops 2012: 517-528 - [c5]Wiebke Menzel, Sven Tuchscheerer, Jana Fruth, Christian Krätzer, Jana Dittmann:
Designansatz und Evaluation von Kindgerechten Securitywarnungen für Smartphones. Sicherheit 2012: 211-221 - 2011
- [j1]Janet Feigenspan, Norbert Siegmund, Jana Fruth:
On the Role of Program Comprehension in Embedded Systems. Softwaretechnik-Trends 31(2) (2011) - [c4]Jana Fruth, Ronny Merkel, Jana Dittmann:
Security Warnings for Children's Smart Phones: A First Design Approach. Communications and Multimedia Security 2011: 241-243 - [c3]Jana Fruth, Christian Kraetzer, Jana Dittmann:
Design and evaluation of multimedia security warnings for the interaction between humans and industrial robots. Intelligent Robots and Computer Vision: Algorithms and Techniques 2011: 78780K - 2010
- [c2]Norbert Siegmund, Janet Feigenspan, Michael Soffner, Jana Fruth, Veit Köppen:
Challenges of secure and reliable data management in heterogeneous environments. IWDE 2010: 17-24 - [c1]Jana Dittmann, Bernhard Karpuschewski, Jana Fruth, Mathias Petzel, Richard Münder:
An exemplary attack scenario: threats to production engineering inspired by the Conficker worm. IWDE 2010: 25-32
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:52 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint